Big Data: 6 Bold Predictions For 2015
Top 10 Social Media Fails Of 2014
Cartoon: Where Data Goes To Die
6 IT Career Resolutions
Geekend: The Inaugural Geeky Awards
News & Commentary
Security News No One Saw Coming In 2014
John B. Dickson, CISSP,  Principal, Denim Group
Commentary
John Dickson shares his list (and checks it twice) of five of the most surprising security headlines of the year.
By John B. Dickson CISSP, Principal, Denim Group, 12/22/2014
Comment0 comments  |  Read  |  Post a Comment
Microsoft Azure Outage Blamed On Bad Code
Charles Babcock, Editor At Large, InformationWeek
News
Microsoft's analysis of Nov. 18 Azure outage indicates engineers' decision to widely deploy misconfigured code triggered major cloud outage.
By Charles Babcock Editor At Large, InformationWeek , 12/22/2014
Comment0 comments  |  Read  |  Post a Comment
Startup Profile: Seculert Prioritizes Response Over Prevention
Andrew Conry Murray, Director of Content & Community, Interop
Commentary
The cloud security newcomer Seculert aims to identify and validate data breaches to enable faster response and remediation.
By Andrew Conry Murray Director of Content & Community, Interop, 12/22/2014
Comment0 comments  |  Read  |  Post a Comment
Don't Mug Me For My Password!
Jutta Williams, Corporate Information Assurance Officer and Chief Compliance Officer, Health First
Commentary
In today's information-based world, crooks are targeting mobile devices -- and the data on them. The healthcare industry is particularly vulnerable.
By Jutta Williams Corporate Information Assurance Officer and Chief Compliance Officer, Health First, 12/22/2014
Comment1 Comment  |  Read  |  Post a Comment
Top 10 Social Media Fails Of 2014
Kristin Burnham, Senior Editor, InformationWeek.com
News
Businesses learn lessons the hard way when their social media posts go wrong. Have a look at the businesses that made this year's naughty list.
By Kristin Burnham Senior Editor, InformationWeek.com, 12/22/2014
Comment1 Comment  |  Read  |  Post a Comment
2015's Most Ridiculous Tech Predictions
Susan Fogarty, Editor in Chief
News
When you've had your fill of technology predictions for 2015, take one more moment to deride the most obvious and least noteworthy of the bunch.
By Susan Fogarty Editor in Chief, 12/22/2014
Comment2 comments  |  Read  |  Post a Comment
802.11ac On The Rise In The Enterprise
Pablo Valerio, International Business & IT Consultant
Commentary
Infonetics report shows that shipments of 802.11ac access points are picking up. The new WiFi standard offers many enterprise benefits, but watch out for integration issues.
By Pablo Valerio International Business & IT Consultant, 12/22/2014
Comment0 comments  |  Read  |  Post a Comment
The Internet's Winter Of Discontent
Paul Vixie, Chairman & CEO, Farsight Security, Inc.
Commentary
The new great cybersecurity challenge in trying to sum up the most dangerous weaknesses in the worldís connected economy is that the hits just keep on coming.
By Paul Vixie Chairman & CEO, Farsight Security, Inc., 12/19/2014
Comment0 comments  |  Read  |  Post a Comment
Video: Hacker Stocking Stuffers, Safe Online Shopping Tips
Andrew Conry Murray, Director of Content & Community, Interop
Commentary
This Week In 60 Seconds celebrates the holiday season with gift ideas for the hacker in your life, tips on how to shop safely online, and predictions for smart wearables.
By Andrew Conry Murray Director of Content & Community, Interop, 12/19/2014
Comment0 comments  |  Read  |  Post a Comment
MyWebGrocer Taps Power Of API
Charles Babcock, Editor At Large, InformationWeek
News
Online ad/coupon service uses API tools to provide targeted advertising for retailers and useful information to consumers.
By Charles Babcock Editor At Large, InformationWeek , 12/19/2014
Comment1 Comment  |  Read  |  Post a Comment
Cartoon: Where Data Goes To Die
Brian Moore, Cartoonist & Illustrator
Commentary
Our cartoonist answers the question of what happens to all that unrecoverable data.
By Brian Moore Cartoonist & Illustrator, 12/19/2014
Comment6 comments  |  Read  |  Post a Comment
Android Antitrust Lawsuit Given Another Chance
Eric Zeman,
News
Judge expressed concern about the plaintiffs' case, but didn't altogether dismiss lawsuit alleging Google antitrust violations.
By Eric Zeman , 12/19/2014
Comment0 comments  |  Read  |  Post a Comment
Time To Rethink Patching Strategies
Kevin E. Greene, Software Assurance Program Manager, Department of Homeland Security Science & Technology Directorate
Commentary
In 2014, the National Vulnerability Database is expected to log a record-breaking 8,000 vulnerabilities. That's 8,000 reasons to improve software quality at the outset.
By Kevin E. Greene Software Assurance Program Manager, Department of Homeland Security Science & Technology Directorate, 12/19/2014
Comment9 comments  |  Read  |  Post a Comment
Geekend: The Inaugural Geeky Awards
David Wagner, Community Editor
Commentary
The Geekend hands out its inaugural Geeky Thing of the Year awards. See if your favorites are on the list.
By David Wagner Community Editor, 12/19/2014
Comment6 comments  |  Read  |  Post a Comment
Big Data: 6 Bold Predictions For 2015
Jeff Bertolucci,
News
'Tis the season when industry soothsayers don their prognostication caps to make fearless forecasts for the coming year. What does the crystal ball say about big data?
By Jeff Bertolucci , 12/19/2014
Comment5 comments  |  Read  |  Post a Comment
Microsoft Previews 6 New Power BI Features
Doug Henschen, Executive Editor, InformationWeek
News
Microsoft beta tests Power BI dashboards, visualizations, connectors, and an iPad app just as IBM launches a rival cloud-based BI service.
By Doug Henschen Executive Editor, InformationWeek, 12/19/2014
Comment0 comments  |  Read  |  Post a Comment
SDN And Security: Start Slow, But Start
Greg Ferro, Network Architect & Blogger
News
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul policies
By Greg Ferro Network Architect & Blogger, 12/19/2014
Comment0 comments  |  Read  |  Post a Comment
Technology Training: Why We're In Hell
Grumpy IT Guy, IT Guy
Commentary
Is the problem the death-by-PowerPoint training that everyone hates? Or that our enterprise apps look worse than Keith Richards with a hangover?
By Grumpy IT Guy IT Guy, 12/19/2014
Comment7 comments  |  Read  |  Post a Comment
6 IT Career Resolutions
Ellis Booker, Technology Journalist
News
Resolve to polish your skills, value, and appeal in 2015 with these tips from recruiters and senior IT executives.
By Ellis Booker Technology Journalist, 12/19/2014
Comment5 comments  |  Read  |  Post a Comment
SDN Developments In 2015
Dan Pitt,
Commentary
ONF executive director Dan Pitt shares his expectations for the evolution of software-defined networking in the coming year.
By Dan Pitt , 12/19/2014
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
7 Excuses To Avoid Family Tech Support
Ellis Booker, Technology Journalist,  12/18/2014
Facebook Dumps Microsoft Bing
Kristin Burnham, Senior Editor, InformationWeek.com,  12/15/2014
7 Tips: Work Fitness Into The Workday
Jeff Bertolucci 12/16/2014
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
InformationWeek 2014 Mobile Security Survey
InformationWeek 2014 Mobile Security Survey
Securing company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.